Troubleshooting Resource Explorer setup and configuration issues - AWS Resource Explorer

Troubleshooting Resource Explorer setup and configuration issues

Use the information here to help you diagnose and fix issues that can occur when you initially set up or configure AWS Resource Explorer.

Troubleshooting permission-based access issues

Resource Explorer provides different user experiences based on your IAM permissions. Use this section to troubleshoot issues related to permission-based access and search results.

I'm getting partial search results instead of complete results

If you're receiving partial search results, this indicates you have, at minimum, the permissions in the AWSResourceExplorerReadOnlyAccess managed policy but lack iam:CreateServiceLinkedRole permission (included in the AWSResourceExplorerFullAccess managed policy), or the service-linked role hasn't been created in your account yet.

  • To get complete results: Obtain iam:CreateServiceLinkedRole permission (included in the AWSResourceExplorerFullAccess managed policy) from your administrator, or sign in with a role that has this permission. Once you initiate a search with both permissions, Resource Explorer will automatically create the service-linked role and provide complete results.

  • If the service-linked role already exists: Verify you have, at minimum, the permissions in the AWSResourceExplorerReadOnlyAccess managed policy. Users with search permission get complete results after searching in a Region once the service-linked role exists in the account.

    Note

    Automatic setup may not happen in this case if an index was previously deleted or the aggregator index already exists

  • Regional differences: Results may vary by Region based on index types. Regions with user-owned indexes provide complete results, while Regions with only Resource Explorer-owned indexes provide partial results.

Service-linked role creation issues

If you receive an error when Resource Explorer attempts to create the service-linked role during your first search, this indicates you lack the iam:CreateServiceLinkedRole permission (included in the AWSResourceExplorerFullAccess managed policy).

  • Resolution: Get permission from your administrator OR sign in with a role that has the iam:CreateServiceLinkedRole permission.

    Note

    Note: The service-linked role only needs to be created once per account. After it's created by any user with the appropriate permission, all users with, at minimum, the permissions in the AWSResourceExplorerReadOnlyAccess managed policy are able to create an index and view for full results in a Region on first search.

I can't access Resource Explorer search functionality

If you receive access denied errors when trying to use Resource Explorer search, you lack at minimum the permissions in the AWSResourceExplorerReadOnlyAccess managed policy.

  • Resolution: Contact your administrator to obtain the permissions in the AWSResourceExplorerReadOnlyAccess managed policy. These permissions are also a subset of the ResourceExplorerFullAccess managed policy

  • Organizational control: If your organization wants to prevent access to Resource Explorer search functionality, administrators can disallow the permissions in the AWSResourceExplorerReadOnlyAccess managed policy.

Indexing progress and completion issues

When Resource Explorer automatically creates indexes and views, you may see indexing progress indicators in the console.

  • Blue banner "Completing Resource Explorer setup": This indicates indexing is in progress. You can search immediately and receive partial results while indexing completes in the background.

  • Green completion banner: This indicates that the user-index is setup. Refresh to view full results.

  • Timeline expectations: Initial indexing typically completes within a few hours, depending on the number of resources in your account. You can use Resource Explorer immediately while indexing continues.

  • If indexing appears stuck: Indexing runs automatically in the background. If you don't see progress after several hours, verify your permissions and try refreshing the console.

I get an "access denied" message when I make a request to Resource Explorer

Access denied errors can occur when accessing Resource Explorer search functionality or when trying to configure enhanced features like custom views or cross-Region search.

  • For basic search access: Verify you have, at minimum, the permissions in the AWSResourceExplorerReadOnlyAccess managed policy. This permission provides immediate access to search functionality.

  • For complete search results: Verify you have both the permissions in the AWSResourceExplorerReadOnlyAccess managed policy and the iam:CreateServiceLinkedRole permission (included in the AWSResourceExplorerFullAccess managed policy), or that the service-linked role already exists in your account.

  • For enhanced features: Verify that you have permissions to call the action and resource that you requested. An administrator can grant permissions by assigning an AWS Identity and Access Management (IAM) permission policy to your IAM principal, such as a role, group, or user.

    To provide access, add permissions to your users, groups, or roles:

    The policy must allow the requested Action on the Resource that you want to access.

    If the policy statements that grant those permissions include any conditions, such as time-of-day or IP address restrictions, you also must meet those requirements when you send the request. For information about viewing or modifying policies for an IAM principal, see Managing IAM policies in the IAM User Guide.

  • If you're signing API requests manually (without using the AWS SDKs), verify that you signed the request correctly.

I get an "access denied" message when I make a request with temporary security credentials

  • Verify that the IAM principal that you're using to make the request has the correct permissions. Permissions for temporary security credentials are derived from a principal defined in IAM, so the permissions are limited to those granted to the principal. For more information about how permissions for temporary security credentials are determined, see Controlling permissions for temporary security credentials in the IAM User Guide.

  • Verify that your requests are being signed correctly and that the request is well formed. For details, see the toolkit documentation for your chosen SDK or Using temporary credentials with AWS resources in the IAM User Guide.

  • Verify that your temporary security credentials haven't expired. For more information, see Requesting temporary security credentials in the IAM User Guide.